Statements (57)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Cloud_Computing_Service
|
gptkbp:allows |
policy enforcement
performance overhead process capabilities |
gptkbp:applies_to |
user space applications
|
gptkbp:can_be |
allowed and denied calls
|
gptkbp:can_be_extended_by |
custom policies
|
gptkbp:developed_by |
gptkb:Open_BSD_project
open source model Open BSD operating system |
gptkbp:first_released |
gptkb:2004
|
gptkbp:has_feature |
logging of system calls
|
https://www.w3.org/2000/01/rdf-schema#label |
Open BSD's systrace
|
gptkbp:integrates_with |
gptkb:operating_system
|
gptkbp:is_available_in |
Open BSD base system
|
gptkbp:is_available_on |
gptkb:Open_BSD_3.5
|
gptkbp:is_compatible_with |
various applications
various programming languages |
gptkbp:is_considered_as |
a security enhancement tool
an advanced security tool security measure |
gptkbp:is_documented_in |
man pages
Open BSDFAQ |
gptkbp:is_implemented_in |
kernel space
|
gptkbp:is_part_of |
gptkb:software
security policies Open BSD operating system Open BSD security architecture Open BSD security features system hardening techniques |
gptkbp:is_related_to |
application security
|
gptkbp:is_similar_to |
gptkb:Linux_seccomp
|
gptkbp:is_supported_by |
gptkb:Open_BSD_community
Open BSD documentation |
gptkbp:is_tested_for |
security researchers
|
gptkbp:is_used_for |
debugging purposes
sandboxing applications malware prevention audit system calls enforce least privilege monitor system behavior restrict file access |
gptkbp:is_used_in |
penetration testing
security auditing |
gptkbp:is_utilized_in |
access control policies
system administrators |
gptkbp:monitors |
network calls
|
gptkbp:operating_system |
gptkb:chess_match
|
gptkbp:primary_function |
monitoring system calls
|
gptkbp:provides |
security enhancements
|
gptkbp:setting |
policy files
allow or deny calls sysctl interface |
gptkbp:supports |
fine-grained access control
|
gptkbp:written_in |
gptkb:language
|
gptkbp:bfsParent |
gptkb:family
|
gptkbp:bfsLayer |
3
|